austin-taylor / bluewall
Bluewall is a firewall framework designed for offensive and defensive cyber professionals.
☆106Updated 6 years ago
Alternatives and similar repositories for bluewall
Users that are interested in bluewall are comparing it to the libraries listed below
Sorting:
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆30Updated 6 years ago
- ☆49Updated 4 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- automate your MISP installs☆68Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Updated 7 years ago
- ☆76Updated 6 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆86Updated 3 years ago
- Learn you a book for some infosec good☆63Updated 5 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago